Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Increase your sales. Streamline Your Costs. Differentiate your MSP. Your MSP can differentiate themselves by using ID Agent. ID Agent provides real-time dark-web search results that create urgency. It also provides sales and marketing-ready resources and coaching so you can make a profit in 30 days or less. Your customers are often only concerned with their network passwords being exposed. They don't think about the possibility of their usernames and passwords being stolen from third-party websites or applications. Three former CEOs of MSPs are on ID Agent's staff. This software provides actionable cybersecurity threat intelligence to Managed Service Providers around the world. We've been there, literally, and we know the challenges and obstacles you face and how to overcome them.
Description
Introducing the only identity and consumer privacy platform designed for agility in today’s digital landscape. Allow us to alleviate your workload; we specialize in simplifying platform integration, launching programs, and enhancing customer interactions. The powerful and feature-laden APIs we create in-house are the same ones we provide to our development partners, all supported by the dedicated IDX team. Each day, we offer adaptable solutions to our clients through an industry-leading, advanced cloud-native platform. By harnessing cutting-edge microservices architecture, we ensure an intuitive, highly scalable, and secure environment. With capabilities for platform load-balancing and auto-scaling, we consistently meet high availability benchmarks. Our commitment to excellent data integrity is reflected in our track record of virtually no downtime. Designed to fulfill the stringent requirements of Fortune 500 companies and the highest government standards, our adaptable solutions are trusted by organizations across various sectors including healthcare, commercial enterprises, finance, and higher education. Ultimately, we strive to be the go-to partner for organizations seeking to enhance their data privacy and identity management efforts.
API Access
Has API
API Access
Has API
Integrations
Autotask PSA
CGM LABDAQ
Elpha Secure
Fieldnotes ai
MyGlue
Network Glue
ThreatAware
Integrations
Autotask PSA
CGM LABDAQ
Elpha Secure
Fieldnotes ai
MyGlue
Network Glue
ThreatAware
Pricing Details
$300 per month
Free Trial
Free Version
Pricing Details
$8.96 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IDAgent, a Kaseya company
Founded
2016
Country
United States
Website
www.idagent.com
Vendor Details
Company Name
IDX
Founded
2003
Country
United States
Website
www.idx.us/platform
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Discovery
Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics
Email Security
Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting
MSP
Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning